首页 | 本学科首页   官方微博 | 高级检索  
     

基于信任列表的可信第三方跨域认证模型
引用本文:颜海龙,喻建平,胡强,冯纪强. 基于信任列表的可信第三方跨域认证模型[J]. 信号处理, 2012, 28(9): 1278-1283
作者姓名:颜海龙  喻建平  胡强  冯纪强
作者单位:深圳大学ATR国防科技重点实验室
基金项目:国家自然科学基金(61171072,11101292)
摘    要:目前国内已有31家获得电子认证服务许可的第三方认证机构(certification authority,CA),跨CA的信任和验证日益迫切。针对该问题,提出了一种基于信任列表的可信第三方跨域认证模型。该模型依托公钥基础设施(public key infrastructure,PKI)所提供的数字证书等安全服务,通过引入新的信任机制更好地管理和控制了可信根证书列表,既避免了传统信任列表模型的诸多缺点,又能够有效实现多CA互信互认。为支持这一跨信任域模型的实际运行,设计了相应的工作流程和多CA认证方案,并开发了多CA应用支撑模块,以及就其中的关键技术问题进行了详细论述。分析表明,该模型能够让应用系统灵活地动态兼容不同CA所颁发的数字证书,且在认证效率、安全性、实用性以及应用改造等方面均具有明显优势。 

关 键 词:信任列表   可信第三方   跨域认证   多CA
收稿时间:2012-03-08

A Trusted Third Party Inter-Domain Authentication Model Based on Trust Lists
YAN Hai-long , YU Jian-ping , HU Qiang , FENG Ji-qiang. A Trusted Third Party Inter-Domain Authentication Model Based on Trust Lists[J]. Signal Processing(China), 2012, 28(9): 1278-1283
Authors:YAN Hai-long    YU Jian-ping    HU Qiang    FENG Ji-qiang
Affiliation:ATR Key Laboratory of National Defense Technology, Shenzhen University
Abstract:At present there are thirty-one third-party certification authorities obtaining a license of electronic certification services in China. The trust and verification schemes between CAs are becoming increasingly urgent. A trusted third party inter-domain authentication model based on trust lists is proposed to solve the existing problem. To overcome the shortcomings of traditional trust lists model, the proposed model utilizes the digital certificate security services provided by public key infrastructure, better manages and controls the trusted root certificate lists through the new trust mechanism. Furthermore, the proposed model can effectively realize multi-CA mutual trust and mutual recognition. We design the work-flow and multi-CA authentication scheme, develop the supporting system to support real realization of multi-CA mutual trust and mutual recognition, and also present the key techniques in details in this paper. Analysis shows that the proposed model can facilitate application systems’ dynamic compatibility to the digital certificates issued by different certification authorities. And it has obvious advantages at authentication efficiency, safety, practicability, application of transformation and Etc. 
Keywords:
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《信号处理》浏览原始摘要信息
点击此处可从《信号处理》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号